Wednesday, March 21, 2012

In almost every area of legal practice increasingly
complex technology is part of a transaction or client dispute. Lawyers
are routinely expected to negotiate contracts for launching content on
the Internet, outsourcing data storage to server farms or purchasing
Cloud Computing services. A client’s data security is routinely tested
by hackers half way across the world or by those in-house. Litigation
often involves bots stealing content on the Internet or cookies
compromising the privacy of individuals. Every court now requires
counsel to address electronic discovery issues but many lawyers don’t
understand their client’s data infrastructure.

Indeed, most lawyers do not have the technical training or experience to
fully understand the technology which is the core of their clients’
technology driven businesses. As a result, they waste time on the wrong
issues or, worse yet, don’t know the right questions to ask their
clients or litigation opponents.

This unique program is designed to give every lawyer a sound foundation
in the complex technologies which drive the Internet, corporate
information infrastructures and mobile computing. It will give you the
insights and experience of technology experts and the lawyers who deal
with them on a daily basis. This is a program for lawyers called upon to
counsel clients or lead litigations in the minefields of technology. In
this first ever Think Like a Lawyer and Ask Questions Like a Geek: Understanding Cybersecurity, Social Media and Mobile Technology 2011 you
will hear simple and direct explanations about current technologies,
including: the structure of Internet communications and the problems
inherent in moving large quantities of data; the basics of how Cloud
Computing works and why your clients can trust these providers; the
tricks hackers use to compromise your personal data and the data of
governments and corporations; the structure of corporate data systems
and where to look for electronic evidence in a litigation party’s
infrastructure, and; the technology that allows mobile computing systems
to locate users and send customized, location-based content.

Lecture Topics [Total time 06:17:30]Segments with an asterisk (*) are available only with the purchase of the entire program.